端口扫描

root@kali2 [/tmp] ➜  nmap -sV -A 192.168.56.19 -p21,25,53,80,88,110,135,139,143,389,445,464,587,593,636,3268,3269,5985,9389,47001,49664,49665,49670,49673,49674,49677,49685,49686,49689,49697,49703
Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-06-06 14:46 CST
Nmap scan report for 192.168.56.19
Host is up (0.00030s latency).

PORT      STATE SERVICE       VERSION
21/tcp    open  ftp?
| ftp-syst: 
|_  SYST: UNIX emulated by FileZilla.
| fingerprint-strings: 
|   DNSStatusRequestTCP, DNSVersionBindReqTCP, GenericLines, NULL, RPCCheck, SSLSessionReq, TLSSessionReq, TerminalServerCookie: 
|     220-FileZilla Server 1.10.0
|     Please visit https://filezilla-project.org/
|   GetRequest: 
|     220-FileZilla Server 1.10.0
|     Please visit https://filezilla-project.org/
|     What are you trying to do? Go away.
|   HTTPOptions, RTSPRequest: 
|     220-FileZilla Server 1.10.0
|     Please visit https://filezilla-project.org/
|     Wrong command.
|   Help: 
|     220-FileZilla Server 1.10.0
|     Please visit https://filezilla-project.org/
|     214-The following commands are recognized.
|     RNTO RNFR XPWD MDTM REST APPE MKD RMD DELE
|     ALLO STOR SIZE CDUP CWD TYPE SYST MFMT MODE XRMD
|     ADAT PROT PBSZ MLSD LIST XCWD NOOP AUTH OPTS EPRT
|     PASS QUIT PWD RETR USER NLST CLNT FEAT ABOR HELP
|     XMKD MLST STRU PASV EPSV PORT STAT
|_    Help ok.
|_ssl-date: TLS randomness does not represent time
|_ftp-anon: got code 503 "Use AUTH first.".
| ssl-cert: Subject: commonName=filezilla-server self signed certificate
| Not valid before: 2025-03-28T16:30:48
|_Not valid after:  2026-03-29T16:35:48
25/tcp    open  smtp          hMailServer smtpd
| smtp-commands: CURIOSITY-DC, SIZE 20480000, AUTH LOGIN, HELP
|_ 211 DATA HELO EHLO MAIL NOOP QUIT RCPT RSET SAML TURN VRFY
53/tcp    open  domain        Simple DNS Plus
80/tcp    open  http          Microsoft IIS httpd 10.0
|_http-server-header: Microsoft-IIS/10.0
| http-methods: 
|_  Potentially risky methods: TRACE
|_http-title: Nextech - Consultor\xC3\xADa Inform\xC3\xA1tica
88/tcp    open  kerberos-sec  Microsoft Windows Kerberos (server time: 2025-06-06 06:46:16Z)
110/tcp   open  pop3          hMailServer pop3d
|_pop3-capabilities: TOP USER UIDL
135/tcp   open  msrpc         Microsoft Windows RPC
139/tcp   open  netbios-ssn   Microsoft Windows netbios-ssn
143/tcp   open  imap          hMailServer imapd
|_imap-capabilities: CAPABILITY IDLE SORT OK ACL RIGHTS=texkA0001 CHILDREN IMAP4rev1 IMAP4 QUOTA NAMESPACE completed
389/tcp   open  ldap          Microsoft Windows Active Directory LDAP (Domain: curiosity.thl0., Site: Default-First-Site-Name)
445/tcp   open  microsoft-ds?
464/tcp   open  kpasswd5?
587/tcp   open  smtp          hMailServer smtpd
| smtp-commands: CURIOSITY-DC, SIZE 20480000, AUTH LOGIN, HELP
|_ 211 DATA HELO EHLO MAIL NOOP QUIT RCPT RSET SAML TURN VRFY
593/tcp   open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
636/tcp   open  tcpwrapped
3268/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: curiosity.thl0., Site: Default-First-Site-Name)
3269/tcp  open  tcpwrapped
5985/tcp  open  http          Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Not Found
9389/tcp  open  mc-nmf        .NET Message Framing
47001/tcp open  http          Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Not Found
49664/tcp open  msrpc         Microsoft Windows RPC
49665/tcp open  msrpc         Microsoft Windows RPC
49670/tcp open  msrpc         Microsoft Windows RPC
49673/tcp open  msrpc         Microsoft Windows RPC
49674/tcp open  msrpc         Microsoft Windows RPC
49677/tcp open  msrpc         Microsoft Windows RPC
49685/tcp open  msrpc         Microsoft Windows RPC
49686/tcp open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
49689/tcp open  msrpc         Microsoft Windows RPC
49697/tcp open  msrpc         Microsoft Windows RPC
49703/tcp open  msrpc         Microsoft Windows RPC

域名curiosity.thl

root@kali2 [/tmp]dig any curiosity.thl @192.168.56.19                                                                                                         [15:24:49]

; <<>> DiG 9.19.21-1-Debian <<>> any curiosity.thl @192.168.56.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 24987
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 2

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4000
;; QUESTION SECTION:
;curiosity.thl.                 IN      ANY

;; ANSWER SECTION:
curiosity.thl.          600     IN      A       192.168.56.19
curiosity.thl.          3600    IN      NS      curiosity-dc.curiosity.thl.
curiosity.thl.          3600    IN      SOA     curiosity-dc.curiosity.thl. hostmaster.curiosity.thl. 46 900 600 86400 3600

;; ADDITIONAL SECTION:
curiosity-dc.curiosity.thl. 3600 IN     A       192.168.56.19

;; Query time: 0 msec
;; SERVER: 192.168.56.19#53(192.168.56.19) (TCP)
;; WHEN: Fri Jun 06 15:32:56 CST 2025
;; MSG SIZE  rcvd: 148

DC curiosity-dc.curiosity.thl 还有一个 hostmaster.curiosity.thl
80端口开了,先看下web

web

20250606154105
页面没什么信息,扫一下目录
20250606154128
可以目录浏览,logs下面没东西,contact下面有东西
20250606154211
20250606154220

20250606154259

Return-Path: [email protected]
Received: from curiositydc (curiosity-dc.curiosity.thl [127.0.0.1])
	by CURIOSITY-DC with ESMTP
	; Mon, 31 Mar 2025 09:30:25 -0700
thread-index: AduiWjUFGYriAzZMTimqSShC3TUMzA==
Thread-Topic: fsdfdfsdf
From: <[email protected]>
To: <[email protected]>
Subject: fsdfdfsdf
Date: Mon, 31 Mar 2025 09:30:25 -0700
Message-ID: <[email protected]>
MIME-Version: 1.0
Content-Type: text/plain
Content-Transfer-Encoding: 8bit
X-Mailer: Microsoft CDO for Windows 2000
Content-Class: urn:content-classes:message
Importance: normal
Priority: normal
X-MimeOLE: Produced By Microsoft MimeOLE

Credentials:
Usuario: student
Contraseña: Hola1234$

域控发来一个用户凭据student:Hola1234$,不过登不上去,随便发个邮件,发现contact目录下多一个

Return-Path: 2814928906@qq.com
Received: from curiositydc (curiosity-dc.curiosity.thl [127.0.0.1])
	by CURIOSITY-DC with ESMTP
	; Fri, 6 Jun 2025 02:24:01 -0700
thread-index: AdvWxL2CNVrlrvcyTQ6T5UXPFdxiYw==
Thread-Topic: abc
From: <2814928906@qq.com>
To: <[email protected]>
Subject: abc
Date: Fri, 6 Jun 2025 02:24:01 -0700
Message-ID: <[email protected]>
MIME-Version: 1.0
Content-Type: text/plain
Content-Transfer-Encoding: 8bit
X-Mailer: Microsoft CDO for Windows 2000
Content-Class: urn:content-classes:message
Importance: normal
Priority: normal
X-MimeOLE: Produced By Microsoft MimeOLE

Credentials:
Usuario: vicky.tale
Contraseña: Hola1234$

拿到一个新的凭据vicky.tale:Hola1234$

WINRM       192.168.56.19   5985   CURIOSITY-DC     [+] curiosity.thl\vicky.tale:Hola1234$ (Pwn3d!)

拿下立足点

*Evil-WinRM* PS C:\Users> dir


    Directory: C:\Users


Mode                 LastWriteTime         Length Name
----                 -------------         ------ ----
d-----          4/5/2025   2:21 AM                Administrator
d-----          4/5/2025   2:03 AM                john.miller
d-r---         3/28/2025   4:41 AM                Public
d-----          6/6/2025   2:16 AM                svcpool
d-----          4/1/2025   1:25 AM                vicky.tale

vicky.tale这个用户没有flag
C:\windows\system32\tasks
TCP 127.0.0.1 14148 0.0.0.0 0 Listening 3044 filezilla-server
C:\Users\All Users\Microsoft\UEV\InboxTemplates\RoamingCredentialSettings.xml

C:\Program Files (x86)\hMailServer\PHPWebAdmin\config-dist.php

password=”[enc:IISWASOnlyCngProvider:FCD/44GP89zDEw2y34M3ScYkiMpvcL6VqBL/g6ePNauAkpBb1Lf1goaoahlqS3i91skdf3rKf+WRCBO7tw2HlFRUJTB5Zn5s1gAv/lWIjpA=:enc]” loadUserProfile=”true” />